Article ID Journal Published Year Pages File Type
412724 Neurocomputing 2010 5 Pages PDF
Abstract

In this paper, we analyze the security of a parallel keyed hash function based on chaotic neural network proposed by Xiao et al. recently. Weak keys and forgery attacks against Xiao et al.’s scheme are demonstrated. Both theoretical analysis and experimental results show that the parallel keyed hash function is not security. Besides, some improvement measures are presented to enhance the security of the parallel keyed hash function.

Related Topics
Physical Sciences and Engineering Computer Science Artificial Intelligence
Authors
, ,